Method and system for linking certificates to signed files

a technology of digital certificates and signed files, applied in the field of network computing security, can solve problems such as difficult inspection, lost digital certificates, accidental or even intentional removal, and methods that are not compatible with standard file formats such as images, video, audio or executable files

Inactive Publication Date: 2007-07-19
KYNDRYL INC
View PDF10 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0038] It is another object of the invention to provide a method and systems adapted for enabling a recipient to check whether or not a received file is a signed file, before opening said file.

Problems solved by technology

However,.if documents are later passed on or moved to new recipients, associated digital certificates can be lost, accidentally removed, or even intentionally removed on the way in an attempt to cheat.
If the document is later passed on or moved, it may be difficult to check again, since the certificate, or the certificate address, could be lost.
Furthermore, the method is not compatible with standard file formats such as image, video, audio or executable files that cannot be recognized prior to authentication.
Thus, there are security problems related to the methods described above for verifying the authenticity of received or accessed files by the recipient: when certificates are sent as separate files, the associated digital certificates could be lost if the signed files are later passed on or moved to new recipients.
In such case, it is impossible to verify these signed files.
Likewise, it is impossible to determine whether or not the certificate is valid i.e., if it has been issued by a CA, if it has not been revoked, and if the certificate date is valid.
If a certificate becomes compromised, the certificate authority can later revoke the certificate, thus rendering invalid all files signed after the signature's revocation date.
A certificate could become compromised if an unauthorized third-party obtained the private key associated with the certificate.
With the private key, an unauthorized person could essentially forge a signature.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for linking certificates to signed files
  • Method and system for linking certificates to signed files
  • Method and system for linking certificates to signed files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] According to the invention, the filename of a file that is accessed locally or through a computer network is used to encode the address, or URL, from which the certificate that can be used to check the integrity and to verify the signature of the file can be accessed. A lexicography is determined so as to avoid particular characters that may be forbidden by the file system, e.g., “\” with Microsoft Windows system (Windows is a Trademark of Microsoft Corporation), and / or to encode the addresses so as to reduce their sizes. Addresses to be encoded may be of any forms e.g., local addresses, addresses in private networks or Internet addresses, however, for sake of illustration, the examples given in the following description are based on URL type of addresses. The address from which the certificate can be accessed can be encoded either when the file is transmitted from a server to the user system or when it is locally saved or transmitted to another system.

[0058]FIG. 1 illustrat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for processing a file having an existing filename. A private key associated with a digital certificate and a certificate address from which the digital certificate may be accessed are received from a certification authority (CA) who issued the digital certificate. A digital signature is generated based on the file and the received private key. The digital certificate includes a public key associated with the private key such that the generated digital signature can be verified through use of the public key. The file is signed with the generated digital signature The received certificate address is encoded to generate an encoded address. The existing filename and the encoded address are merged to generate a new filename. The file is renamed with the new filename. The renamed file may be authenticated by verifying the digital signature via execution of an authentication algorithm in conjunction with the public key.

Description

COPYRIGHT NOTICE [0001] A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent disclosure, as it appears in the National Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. FIELD OF THE INVENTION [0002] The present invention relates generally to network computing security and more specifically to a method and systems for linking a digital certificate to a digitally signed file that can be accessed through a network so as to provide information relative to the signer identity and the validity of the signature that can be used before opening the file. BACKGROUND OF THE INVENTION [0003] To improve data transmission security over computer networks and to prevent digital forgery, a digital signature is commonly used to authenticate a file i.e., to check file integrity and to authenticate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00G06F21/64
CPCG06F21/645G06F17/00G06F21/00
Inventor CARRO, FERNANDO INCERTIS
Owner KYNDRYL INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products